IAM, APTs, and Self-Sovereign Identity headline this week’s digest of Identity Management articles for Cybersecurity Professionals.
Thanks for checking out this week’s digest of articles for Cybersecurity Professionals. Click here to view the healthcare-focused digest.
Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered Tuesdays at 8 PM ET.
9 Identity Management Articles for Cybersecurity Professionals
6 Reasons You Should Get Started with an Identity Management Roadmap via Idenhaus
An Identity Management Roadmap engagement assesses the current state of your IAM program, identifies challenges, and develops a clear plan to implement.
Industrial Cybersecurity Concerns Heat Up in The Era of COVID-19 via AutomationWorld
As industrial companies connect plant-level software and devices to internet-connected enterprise systems, cybersecurity has become a critical operations issue for manufacturers of all sizes.
How to Modernize Legacy and Next Gen Cloud Identity and Access Management via IntegrationDeveloperNews
With more organizations deploying a cloud-first strategy, it’s critical that businesses have an efficient and secure cloud-based way to administer, authenticate, analyze, govern, and manage identities.
Are Cloud-Native IAM Controls Good Enough for Your Enterprise? via Security Intelligence
IT and IAM teams must go beyond native controls and think about the IAM governance program from a broader, programmatic perspective. You should leverage these native controls according to a unified corporate governance policy that includes a predefined access model.
FBI: APTs Actively Exploiting Fortinet VPN Security Holes via ThreatPost
Three security vulnerabilities in the Fortinet SSL VPN are being used to gain a foothold within networks before moving laterally and carrying out recon.
Credential Management for IoT Devices: Rethinking Access Control and Authentication via Business2Community
Companies need to develop strong authentication communication protocols that provide integrity and confidentiality protection. Otherwise, hackers can modify the messages that are in transit or steal critical data by eavesdropping.
533 million Facebook users’ phone numbers and personal data have been leaked online via IGN
The personal data and phone numbers of over 533 million Facebook users were leaked on a low level hacking forum on Saturday, April 3.
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the DizmeID Foundation and technical project with the intent to support digital identity credentialing.
Mastering Identity Management: When Your HRIS System Falls Short via Idenhaus
Building an IAM solution for the first time often reveals issues with HRIS data and user management processes that can stall your IAM implementation. The question is: can we define a common approach to improve the quality of HRIS data so that our IAM solution succeeds?
To receive the top Identity Management articles for Cybersecurity Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.
Follow @Idenhaus on Twitter and subscribe to our YouTube channel.
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us